You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
On Windows malware will often compress embedded shellcode/payloads and then use RtlDecompressBuffer to decompress it, with LZNT1 decompression. NTFS also uses this compression method. Here is an example of a pure Python implementation.
The text was updated successfully, but these errors were encountered:
Introduces support for LZNT1 decompression, commonly leveraged by malware through RtlDecompressBuffer (closesgchq#534).
The decompression logic is ported from go-ntfs, the test data is similar to malduck's.
from: gchq#1675
Summary
On Windows malware will often compress embedded shellcode/payloads and then use RtlDecompressBuffer to decompress it, with LZNT1 decompression. NTFS also uses this compression method. Here is an example of a pure Python implementation.
The text was updated successfully, but these errors were encountered: